New codingmarks added in the 21th week of 2018

By Adrian Matei

New codingmarks added in the 21th week of 2018. Hot topics include:

apache-kafka

Apache Kafka as an Event-Driven Backbone for Service Architectures

Learn how Apache Kafka differs from traditional messaging technologies, configurations you should consider, and patterns you should implement or avoid.


How Apache Kafka Inspired Our Platform Events Architecture

There’s a class of scalability challenges that are best approached using an asynchronous, event-driven architecture — particularly when it comes to doing data integrations.


Apache Kafka

Apache Kafka: A Distributed Streaming Platform.


architecture

Apache Kafka as an Event-Driven Backbone for Service Architectures

Learn how Apache Kafka differs from traditional messaging technologies, configurations you should consider, and patterns you should implement or avoid.


How Apache Kafka Inspired Our Platform Events Architecture

There’s a class of scalability challenges that are best approached using an asynchronous, event-driven architecture — particularly when it comes to doing data integrations.


Sharding & IDs at Instagram – Instagram Engineering

With more than 25 photos and 90 likes every second, we store a lot of data here at Instagram. To make sure all of our important data fits into memory and is available quickly for our users, we’ve begun to shard our data — in other words, place the data in many smaller buckets, each holding a part of the data.


async

Zuul 2 : The Netflix Journey to Asynchronous, Non-Blocking Systems

We recently made a major architectural change to Zuul, our cloud gateway. Did anyone even notice!?


How Apache Kafka Inspired Our Platform Events Architecture

There’s a class of scalability challenges that are best approached using an asynchronous, event-driven architecture — particularly when it comes to doing data integrations.


cloud

Gluster

Gluster is a software defined distributed storage that can scale to several petabytes. It provides interfaces for object, block and file storage.


How to Create an S2I Builder Image – OpenShift Blog

This article is about creating a simple S2I builder image in OpenShift 3.


continuous-deployment

GitHub – openshift/source-to-image: A tool for building/building artifacts from source and injecting into docker images

Source-to-Image (S2I) is a toolkit and workflow for building reproducible Docker images from source code. S2I produces ready-to-run images by injecting source code into a Docker container and letting the container prepare that source code for execution. By creating self-assembling builder images, you can version and control your build environments exactly like you use Docker images to version your runtime environments.


cryptography

SSL/TLS handshake Protocol – YouTube

What protocol is used between a web server and its clients to establish trust? How do they negotiate and share the secret key? During the handshake process, how public key encryption algorithm is used and how private key encryption is used? In this video, you would find all these answers.


What is digital signature? – YouTube

A digital signature is equivalent to a handwritten signature in paper, and a digital signature serves three basic purposes. Digital signature is commonly used for software distribution, financial transactions and other cases where it is important to detect forgery. Digital signatures are very popular with e-mail users.

In this video, I will talk about the digital, uses, and the whole process of creating and sending digitally signed document over the Internet.

Keep in mind, digital signature is not about encrypting document, just like paper-based signature.

Beware:

Public key encrypts, private key decrypts (encrypting)
Private key encrypts, public key decrypts (signing)

How does a public key verify a signature? – Stack Overflow

Public key encrypts, private key decrypts (encrypting)
Private key encrypts, public key decrypts (signing)

database

Transaction log – Wikipedia

In the field of databases in computer science, a transaction log (also transaction journal, database log, binary log or audit trail) is a history of actions executed by a database management system used to guarantee ACID properties over crashes or hardware failures. Physically, a log is a file listing changes to the database, stored in a stable storage format.


docker

GitHub – openshift/source-to-image: A tool for building/building artifacts from source and injecting into docker images

Source-to-Image (S2I) is a toolkit and workflow for building reproducible Docker images from source code. S2I produces ready-to-run images by injecting source code into a Docker container and letting the container prepare that source code for execution. By creating self-assembling builder images, you can version and control your build environments exactly like you use Docker images to version your runtime environments.


filesystem

Gluster

Gluster is a software defined distributed storage that can scale to several petabytes. It provides interfaces for object, block and file storage.


glossary

Transaction log – Wikipedia

In the field of databases in computer science, a transaction log (also transaction journal, database log, binary log or audit trail) is a history of actions executed by a database management system used to guarantee ACID properties over crashes or hardware failures. Physically, a log is a file listing changes to the database, stored in a stable storage format.


go

Hashids – generate short unique ids from integers

Generate short unique ids from integers. Use in url shortening or as unique ids.


java

Hashids – generate short unique ids from integers

Generate short unique ids from integers. Use in url shortening or as unique ids.


javascript

Hashids – generate short unique ids from integers

Generate short unique ids from integers. Use in url shortening or as unique ids.


lua

Hashids – generate short unique ids from integers

Generate short unique ids from integers. Use in url shortening or as unique ids.


openshift

GitHub – openshift/source-to-image: A tool for building/building artifacts from source and injecting into docker images

Source-to-Image (S2I) is a toolkit and workflow for building reproducible Docker images from source code. S2I produces ready-to-run images by injecting source code into a Docker container and letting the container prepare that source code for execution. By creating self-assembling builder images, you can version and control your build environments exactly like you use Docker images to version your runtime environments.


How to Create an S2I Builder Image – OpenShift Blog

This article is about creating a simple S2I builder image in OpenShift 3.


pki

PKI – trust & chain of trust -why, who and how? – YouTube

What is public key infrastructure? What is trust? Why do we need trust over the Internet? Who should be trusted?

In this video, I will talk about two trust models: Hierarchical Trust Model and distributed trust model, and how they help us to build trust with strangers over the Internet so that we could be able to do business online.


ruby

Hashids – generate short unique ids from integers

Generate short unique ids from integers. Use in url shortening or as unique ids.


security

PKI – trust & chain of trust -why, who and how? – YouTube

What is public key infrastructure? What is trust? Why do we need trust over the Internet? Who should be trusted?

In this video, I will talk about two trust models: Hierarchical Trust Model and distributed trust model, and how they help us to build trust with strangers over the Internet so that we could be able to do business online.


SSL/TLS handshake Protocol – YouTube

What protocol is used between a web server and its clients to establish trust? How do they negotiate and share the secret key? During the handshake process, how public key encryption algorithm is used and how private key encryption is used? In this video, you would find all these answers.


What is digital signature? – YouTube

A digital signature is equivalent to a handwritten signature in paper, and a digital signature serves three basic purposes. Digital signature is commonly used for software distribution, financial transactions and other cases where it is important to detect forgery. Digital signatures are very popular with e-mail users.

In this video, I will talk about the digital, uses, and the whole process of creating and sending digitally signed document over the Internet.

Keep in mind, digital signature is not about encrypting document, just like paper-based signature.

Beware:

Public key encrypts, private key decrypts (encrypting)
Private key encrypts, public key decrypts (signing)

How does a public key verify a signature? – Stack Overflow

Public key encrypts, private key decrypts (encrypting)
Private key encrypts, public key decrypts (signing)

Hashids – generate short unique ids from integers

Generate short unique ids from integers. Use in url shortening or as unique ids.


ssl

SSL/TLS handshake Protocol – YouTube

What protocol is used between a web server and its clients to establish trust? How do they negotiate and share the secret key? During the handshake process, how public key encryption algorithm is used and how private key encryption is used? In this video, you would find all these answers.


storage

Gluster

Gluster is a software defined distributed storage that can scale to several petabytes. It provides interfaces for object, block and file storage.


tls

SSL/TLS handshake Protocol – YouTube

What protocol is used between a web server and its clients to establish trust? How do they negotiate and share the secret key? During the handshake process, how public key encryption algorithm is used and how private key encryption is used? In this video, you would find all these answers.


New codingmarks added in the 21th week of 2018 was originally published by Codingpedia Association at CodingpediaOrg on May 28, 2018.

Source:: codingpedia.org